Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:21 AM
Dark Reading
Dark Reading
Products and Releases

CounterTack Announces Scout V3.2

CounterTack Scout offers a platform for next-generation honeynet deployments

WALTHAM, Mass. (February 26, 2013) – CounterTack, the industry's first and only provider of in-progress cyber attack intelligence and response solutions, today announced the next version of CT Scout (formerly Event Horizon®), a cyber intelligence product helping enterprise and government organizations close the Detection Gap.

The CounterTack Scout product offers a unique platform for next-generation honeynet deployments as well as advanced malware analysis. A self-contained appliance with a multi-blade virtual machine (VM) architecture, CT Scout supports a range of honeynet configurations, from single honeypots in sensitive network areas to networks of honeynet systems deployed throughout enterprise networks to improve detection coverage and perceptual consistency.

"It's fair to say that many of us want to see what the bad guys are up to, how they're coming after us, and what they're coming for, but we certainly don't want to let them into our production systems to watch them work," said Christian Seifert, CEO of The Honeynet Project. "If your job is to protect your assets, there's no better way to keep abreast of what the bad guys are up to than to watch them work, and honeynets give us a way to do that in a lower risk setting."

CounterTack's CT Scout appliance also provides a safe way to detonate malware for detailed analysis. When configured as a closed protected environment, the CT Scout VM architecture supports configurations of exact Windows and Linux production-system replicas, including network connectivity. By leveraging CounterTack's patented Deep System Inspection technology, CT Scout provides unique visibility into previously undetectable malware behaviors.

"You can't protect against what you can't see," said Sean Bodmer, Chief Researcher in the CounterTack Cyber Counterintelligence Research Lab. "The kind of intelligence we're gaining with Deep System Inspection on CT Scout is what enabled us to figure out how to detect Red October and other advanced threats."

CT Scout V3.2 will be available for sale in March 2013 and is being demonstrated at the RSA Conference this week at CounterTack's booth #2533.

About CounterTack

CounterTack, the industry's first and only in-progress attack intelligence and response solution provider, was born out of the critical need to develop new security approaches for enterprise and government organizations. The detection gap persists despite massive investments and continuing advancements in security technologies, with cyber attacker innovations outpacing cyber defenses. CounterTack is leading the way on new approaches for deeper security intelligence monitoring and faster attack response.

Press Contact:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.